To use Cyware you must have cookies enabled. By Registering or Signing in, you agree to our Terms and Privacy Policy. You can also signup using Google Account. We will not use your credentials to import contacts or post anything on your account without your permission.For more info, please see Login FAQ.

The attackers leveraged the so-called ‘spear phishing’ email to trick employees into downloading malware or giving away their passwords.

The team of hackers behind the campaign are believed to be the work of an APT 10 threat actor group who is associated with the Chinese Ministry of State Security.

The latest report has revealed that Chinese hackers had targeted eight large technology service providers across the globe as a part of a global hacking campaign dubbed Cloud Hopper. The attack was carried out by Chinese hackers with an aim to steal corporate assets and trade secrets.

Which are the impacted firms?

Earlier reports had identified Hewlett Packard Enterprise and IBM to be impacted by the campaign. However, Reuters’ investigation has disclosed that the campaign has ensnared at least six more major technology firms.

The six other victim companies are Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation, and DXC Technology. HPE had spun-off its service arm in a merger with Computer Sciences Corporation in 2017 to create DXC.

Who is responsible?

Although it is still unclear as what data was stolen in the campaign, Reuters has revealed that the attack had also affected the telecommunications & networking firm Ericsson, travel reservation platform Sabre and Huntington Ingalls industries. The team of hackers behind the campaign are believed to be the work of an APT 10 threat actor group who is associated with the Chinese Ministry of State Security.

How was it carried out?

The attackers leveraged the so-called ‘spear phishing’ email to trick employees into downloading malware or giving away their passwords. The attack was initiated after hackers penetrated HPE’s cloud computing service and used it as a launchpad to attack both customers and clients. This enabled the attackers to pilfer a huge volume of corporate and government secrets.

Worth noting

The investigation found that these service providers had withheld information from hacked clients, out of concern over legal liability and bad publicity. The campaign also highlights the security vulnerabilities inherent in cloud computing services.

How did the companies respond?

Reuters interviewed 30 people involved in the Cloud Hopper investigations. It has found that HPE has worked diligently to mitigate the attack to protect its customers’ information.

“We remain vigilant in our efforts to protect against the evolving threats of cyber-crimes committed by state actors,” said spokesman Adam Bauer. Commenting on behalf of DXC, Bauer told, “Since the inception of DXC Technology, neither the company nor any DXC customer whose environment is under our control have experienced a material impact caused by APT10 or any other threat actor.”

IBM also reported having no evidence if any sensitive data was compromised in the attack.

On the other hand, the Chinese government has declined all accusations of involvement in hacking. “The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,” said Chinese Foreign Ministry, Reuters reported.

Ryan Stewart

Ryan is a senior cybersecurity and privacy analyst. He keenly follows the innovation and development in cybersecurity technologies, and loves to educate everyone about the what, why, and how of major incidents in the cybersecurity world.

Who we are

Cyware is a first-of-its-kind, comprehensive cyber situational awareness platform, designed to help you stay informed about the latest happenings in the cyber world with expertly curated news stories and updates.

Our Technology

Let IBM's Watson Find the Right News For You

The cyber threat landscape is changing rapidly, and cybersecurity news has claimed its spot on the front pages in recent months. It's not easy to find the right information from tens of thousands of cyber news articles and feeds published every day. Our machine learning based curation engine brings you the most relevant cyber content based on your needs.

Receive Daily Cyber News in Your Inbox

From the latest cyber security trends and innovations to new malware, vulnerabilities and threat intelligence, we bring you the most up-to date and relevant cyber updates and news alerts.